default search action
Huaqun Guo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c49]K. Mohamed Sharaafat, Yi Ling Celeste Lau, Sebastian Wong, Yu Tan, Muhammad Khairin Bin Mohd, Isaac Medina Agatep, Zhiyuan Zhang, Huaqun Guo:
Data Crawling for Malware Analysis for Holistic Prevention of Future Exploits. ICCCS 2023: 719-724 - [c48]Jackson Lim, Yi Lin Lau, Leshawn Khin Ming Chan, Jia Ming Tristan Paul Goo, Huahua Zhang, Zhiyuan Zhang, Huaqun Guo:
CVE Records of Known Exploited Vulnerabilities. ICCCS 2023: 738-743 - [c47]Ng Wei Shen Jackson, Jullisha Sasikumar, Wong Yok Hung, Osama Rasheed Khan, Vivian Ng Zhi Hui, Sahar Al-Sudani, Huaqun Guo, Zhiyuan Zhang, Zhengkui Wang:
The Impact of the COVID-19 Pandemic on Retrenchment, Vaccinations, and Global Happiness. DeSE 2023: 280-286 - [c46]Waafi Abdullah Bin Adam, Ivriah Yue Xuan Tan, Chung Shing Lai, Nurtiara Tania Rahim, Benjamin Yu Bin Tham, Huaqun Guo:
VishingDefender: An Advanced Vishing Defence System Against Vishing Attacks. SOLI 2023: 1-8 - [c45]Wei Herng Ang, Huaqun Guo, Eyasu Getahun Chekole:
VulnGen: Vulnerable Virtual Machine Generator. SOLI 2023: 1-8 - [c44]Zeus Sze Hao Chan, Hon Ngee Teo, Jing Hao Lim, Leslie Zhen Yong Tan, Huaqun Guo:
Unifying Web Security Assessments with MALA: A Modular Approach. SOLI 2023: 1-7 - [c43]Terence Charles Ong, A. Benjamin Premkumar, Huaqun Guo:
Cyber Range Revolution: Transforming the Future of Cybersecurity Training. SOLI 2023: 1-6 - [c42]Daiyu Sim, Huaqun Guo, Luying Zhou:
A SIEM and Multiple Analysis Software Integrated Malware Detection Approach. SOLI 2023: 1-7 - [c41]Rongjie Zhou, Huaqun Guo, Francis E. C. Teo, Spiridon Bakiras:
A Survey on Post-Quantum Cryptography for 5G/6G Communications. SOLI 2023: 1-6 - 2021
- [c40]Eyasu Getahun Chekole, Huaqun Guo:
DARUD: Detecting and Arresting Rogue USB Devices in the V2X Ecosystem. SOLI 2021: 1-6 - [c39]Huaqun Guo, Meng Wei, Ping Huang, Eyasu Getahun Chekole:
Enhance Enterprise Security through Implementing ISO/IEC 27001 Standard. SOLI 2021: 1-6 - 2020
- [j6]Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo, Unnikrishnan Cheramangalath:
CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems. Comput. Secur. 94: 101832 (2020) - [c38]Zi Shan Lee, Huaqun Guo, Luying Zhou:
Rail System Anomaly Detection via Machine Learning Approaches. TENCON 2020: 824-828
2010 – 2019
- 2019
- [j5]Dong Li, Huaqun Guo, Jianying Zhou, Luying Zhou, Jun Wen Wong:
SCADAWall: A CPI-enabled firewall model for SCADA security. Comput. Secur. 80: 134-154 (2019) - [j4]Luying Zhou, Huaqun Guo, Gelei Deng:
A fog computing based approach to DDoS mitigation in IIoT systems. Comput. Secur. 85: 51-62 (2019) - [c37]R. Dheeraj, Huaqun Guo, Bharadwaj Veeravalli, Xingjie Yu:
Design and Development of SCADA Firewall Security Features for Protecting Industrial Operations. APWCS 2019: 1-5 - [c36]Yin Rui, Nicholas Heng-Loong Wong, Huaqun Guo, Wang Ling Goh:
Data-Driven Attack Anomaly Detection in Public Transport Networks. APWCS 2019: 1-5 - [c35]Xingjie Yu, Huaqun Guo:
A Survey on IIoT Security. APWCS 2019: 1-5 - [c34]Gelei Deng, Xingjie Yu, Huaqun Guo:
Efficient Password Guessing Based on a Password Segmentation Approach. GLOBECOM 2019: 1-6 - [c33]Eyasu Getahun Chekole, Huaqun Guo:
ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICS. ICSS 2019: 60-69 - [c32]Jiqiang Lu, Zhigang Zhao, Huaqun Guo:
White-Box Implementation of the KMAC Message Authentication Code. ISPEC 2019: 248-270 - [c31]Huaqun Guo, Ezekiel Wei Ren Tan, Luying Zhou, Zhigang Zhao, Xingjie Yu:
2FA Communication Protocol to Secure Metro Control Devices. ITSC 2019: 1019-1024 - 2018
- [c30]Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo:
Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems. ESSoS 2018: 9-26 - [c29]Huaqun Guo, Jonathan Zhi Wei Sim, Bharadwaj Veeravalli, Jiqiang Lu:
Protecting Train Balise Telegram Data Integrity. ITSC 2018: 806-811 - [c28]Elvira Febiani, Huaqun Guo, Wang Ling Goh:
An Advanced Firewall Rule Matching Algorithm. SOLI 2018: 49-54 - [c27]Luying Zhou, Huaqun Guo:
Anomaly Detection Methods for IIoT Networks. SOLI 2018: 214-219 - [c26]Zhigang Zhao, Huaqun Guo:
Method for Enforcing Access Control Policies on NCMS. SOLI 2018: 226-231 - [c25]Marcellinus Hendro Adi Wibowo, Huaqun Guo, Wang Ling Goh:
Detecting anomalies in metro systems. WF-IoT 2018: 302-307 - [i1]Eyasu Getahun Chekole, Unnikrishnan Cheramangalath, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo:
Taming the War in Memory: A Resilient Mitigation Strategy Against Memory Safety Attacks in CPS. CoRR abs/1809.07477 (2018) - 2017
- [c24]Huaqun Guo, Jun Wen Wong:
Cyber-physical authentication for metro systems. APCC 2017: 1-6 - [c23]Luying Zhou, Huaqun Guo, Dong Li, Jianying Zhou, Jun Wen Wong:
A scheme for lightweight SCADA packet authentication. APCC 2017: 1-6 - [c22]Luying Zhou, Huaqun Guo, Dong Li, Jun Wen Wong, Jianying Zhou:
Mind the Gap: Security Analysis of Metro Platform Screen Door System. SG-CRC 2017: 70-85 - 2016
- [c21]Dong Li, Huaqun Guo, Jia Xu:
Enhancing TPM Security by Integrating SRAM PUFs Technology. CPSS@AsiaCCS 2016: 82-93 - 2012
- [c20]Alok Pathak, Wai-Choong Wong, Huaqun Guo, Yongdong Wu:
Remote tracking protocol with predictive localization algorithm. ICON 2012: 268-273 - [c19]Tao Li, Huaqun Guo, Maode Ma:
Hybrid multimedia broadcast encryption schemes. WCNC 2012: 2598-2602 - 2011
- [j3]Huaqun Guo, Yongdong Wu, Feng Bao, Hongmei Chen, Maode Ma:
UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications. IEEE Trans. Smart Grid 2(4): 707-714 (2011) - [c18]Qingqing Yi, Huaqun Guo, Wai-Choong Wong:
Design and implementation of Sub-Cover difference broadcast encryption algorithm. ICICS 2011: 1-5 - [c17]Tao Li, Huaqun Guo, Maode Ma:
Matrix-tree based hybrid broadcast encryption. GLOBECOM Workshops 2011: 61-65 - [c16]Huaqun Guo, Fan Yu, Zonghua Zhang, Wai-Choong Wong, Maode Ma, Yongdong Wu:
HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication. ICC 2011: 1-5 - [c15]Huaqun Guo, Shen-Tat Goh, Nicholas C. S. Foo, Qian Zhang, Wai-Choong Wong:
Performance evaluation of 802.11p device for secure vehicular communication. IWCMC 2011: 1170-1175 - [c14]Xi Yu, Huaqun Guo, Wai-Choong Wong:
A reliable routing protocol for VANET communications. IWCMC 2011: 1748-1753 - [c13]Huaqun Guo, Yongdong Wu, Hongmei Chen, Maode Ma:
A Batch Authentication Protocol for V2G Communications. NTMS 2011: 1-5 - 2010
- [c12]Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra, Yongdong Wu:
Secure wireless communication platform for EV-to-Grid research. IWCMC 2010: 21-25
2000 – 2009
- 2009
- [c11]Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong, Ping Yang, Nazreen Beevi:
DINCast: Optimizing Application-Level Shared-Tree Multicast. AINA 2009: 270-277 - [c10]Joseph Chee Ming Teo, Lek Heng Ngoh, Huaqun Guo:
An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular Networks. AINA 2009: 675-682 - [c9]Huaqun Guo, Lek Heng Ngoh, Yongdong Wu, Joseph Chee Ming Teo:
Secure wireless vehicle monitoring and control. APSCC 2009: 81-86 - [c8]Huaqun Guo, H. S. Cheng, Yongdong Wu, J. J. Ang, F. Tao, A. K. Venkatasubramanian, C. H. Kwek, L. H. Liow:
An Automotive Security System for Anti-theft. ICN 2009: 421-426 - 2006
- [j2]Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong, Joo Geok Tan:
Comparison of in-network versus Staggered Multicast video distribution models. Multim. Tools Appl. 28(3): 373-394 (2006) - [c7]Huaqun Guo, D. Q. Zhang, Lek Heng Ngoh, Wai-Choong Wong, S. Zheng, Y. K. Koh:
An Optimized Peer-to-Peer Overlay Network for Service Discovery. ISCC 2006: 82-87 - 2005
- [j1]Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong, Joo Geok Tan:
DINCast: a hop efficient dynamic multicast infrastructure for P2P computing. Future Gener. Comput. Syst. 21(3): 361-375 (2005) - [c6]Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong:
Optimizing Inter-domain Multicast Through DINloop with GMPLS. ICN (2) 2005: 50-57 - [c5]Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong:
Application-Level Multicast Using DINPeer in P2P Networks. ICN (2) 2005: 754-761 - [c4]Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong, Ligang Dong:
DINPeer: Optimized P2P Communication Network. ICOIN 2005: 561-570 - [c3]Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong:
DINloop based inter-domain multicast with MPLS. IPCCC 2005: 241-248 - [c2]Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong:
A DINloop-Based Inter-domain Multicast Using MPLS. ISCC 2005: 406-411 - [c1]Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong:
DINPeer: An Optimized P2P Communication Network for Advanced Collaborative Environments. PDPTA 2005: 564-570
Coauthor Index
aka: Wai-Choong Wong
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint